2013
DOI: 10.3844/ajassp.2013.35.41
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Chaotic Encryption Technique

Abstract: Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a tool for commercial field increased, So that security is an enormously important issue to deal with. We need to be protected confidentiality of data and provide secure connections for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…This method uses fuzzy vault scheme to lock the key and unlock the Vault to regenerate the key at receiver side. Liu and Kwak (2010;Babu and Singh, 2013) proposed hybrid security mechanism for secure communication over WBAN. The asymmetric cryptography only employed for node association process (Poon et al, 2006;Raghini et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…This method uses fuzzy vault scheme to lock the key and unlock the Vault to regenerate the key at receiver side. Liu and Kwak (2010;Babu and Singh, 2013) proposed hybrid security mechanism for secure communication over WBAN. The asymmetric cryptography only employed for node association process (Poon et al, 2006;Raghini et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…As conclusion, cryptography solutions are the best approaches to secure or protect SCADA communication over internet and successfully decrease the risks (Shahzad et al, 2014a;Asenjo, 2005;Babu and Singh, 2013). Advance Encryption Standard (AES) 256, HMAC and MD5 as part of cryptography solutions have been deployed, to protect SCADA communication, while intrusions (anomaly) are detected by Intelligent Electronic Device (IED) as part of substation controller (Musa and Aborujilah, 2013a;Hong, 2010;AL-Saidi et al, 2011).…”
Section: Problem Statements: Scada Systemmentioning
confidence: 99%